Vulnerability scanning

featured-images

What does vulnerability scanning do?

Vulnerability scanning is the process of scanning software and systems for known vulnerabilities. A vulnerability scanner will maintain and refer to a massive database of known vulnerabilities in order to compare and classify anything it finds. Vulnerability scanners work by scanning for known entry points (A field on a form on a webpage for instance) and testing what would happen if known exploit code were sent to it. Another way to look at it is like a conversation, where the scanner โ€˜talksโ€™ to the software and then measures its response against known responses of vulnerable systems.

How do you perform a vulnerability scan?

A vulnerability scan is performed by a piece of software that resides either on a system inside the network, or more often on a cloud service. Modern scanners are very powerful and have a lot of automation built-in, so for a basic scan you can just point it to the right place and set it to run automatically at regular intervals.

How often should you run a vulnerability scan?

This really depends on how big and how important the target is. For a small business that provides simple services externally you could assume a minimum of twice a year to be a reasonable number, but for businesses with critical data or online services, once a month or even more would be more sensible.

How long does a vulnerability scan take?

Depending on the size and complexity of the target a scan can take anything from a few minutes to a few days.

Why do I need vulnerability scanning?

Apart from your legal obligations, vulnerability scanning is the best way to make sure that you find vulnerabilities before a hacker does. Hundreds of thousands, if not millions of hackers operate globally, constantly testing systems for vulnerabilities. In this game of cat and mouse it is our job to make sure that we find vulnerabilities before they do so that we can fix them.

What are the types of vulnerability scans?

The two major types of vulnerability scans are standard and authenticated. With a standard scan the scanner works on the system as if it were an outsider, not having any knowledge of or access to the underlying system. This is the most common type of scan. With an authenticated scan the scanner is given credentials that enable it to automatically log on as a user and access all of the functions not available to an outsider. This is a more thorough type of scan, but is riskier and takes longer.

How much does a vulnerability scan cost?

Vulnerability scanners are usually licenced annually dependent on the number of sites. Prices generally start from around ยฃ2,500 and can run into many hundreds of thousands.

Tailored Protection

Risk
Reduction

Trusted Expertise

Trusted
Expertise

24/7 Support

24/7
Support

Easy Compliance

Pain-Free
Compliance

Latest Articles

Acunetix web vulnerability scanner

Acunetix web vulnerability scanner

How Acunetix Works Acunetix works in the following manner: Acunetix DeepScan analyses the entire website by following all the links on the site, including links which are dynamically constructed using JavaScript, and links found in robots.txt and sitemap.xml (if...

read more
Do I need a penetration test?

Do I need a penetration test?

Do I need a penetration test? If you have a website that takes information about usersโ€ฆ If you have a website that takes credit cardsโ€ฆ If you have an internal system that shares personal information with external bodiesโ€ฆ If you develop systems that will hold personal...

read more
How do you perform a vulnerability scan?

How do you perform a vulnerability scan?

How do you perform a vulnerability scan? A vulnerability scan is performed by a piece of software that resides either on a system inside the network, or more often on a cloud service. Modern scanners are very powerful and have a lot of automation built-in, so for a...

read more
What is a virtual CISO? When and how to hire one

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are in high demand, and good ones are expensive and difficult to find. Following a rash of high-profile data breaches, and knowing that such breaches have far-reaching consequences that are far more costly than the cost of...

read more
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Penetration testing and vulnerability scanning are often confused as the same service. This leads to business owners purchasing one when they really need the other. Below, we will outline the differences between the two to help better your understanding and ascertain which service your business requires.

read more

Get in Touch

Have any questions or need assistance? Fill out the form below and one of our helpful and friendly cyber security experts will get back to you promptly.